Behavioral task
behavioral1
Sample
dc7d5aaa-87b4-4a7d-a767-2b9cdda7b900.doc
Resource
win7-20220812-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
dc7d5aaa-87b4-4a7d-a767-2b9cdda7b900.doc
Resource
win10v2004-20220812-en
4 signatures
150 seconds
General
-
Target
dc7d5aaa-87b4-4a7d-a767-2b9cdda7b900
-
Size
120KB
-
MD5
70dd7fe3c4704a1d7a559923458a312c
-
SHA1
8fe9f4bd347a1652386c5e28484053cfc0795702
-
SHA256
e4c73e3f1da0500332101eb9f7a7bfca9b89f19359c3724f6993fbf525bafe91
-
SHA512
70b6574db873096b3579cf98d88743f49cb0a96f2ba5209151b46d8381b9cd3a7a4277b5e2716b717e361bf956e5eef41a486ba8a0d8e3c0f553e03beac1cc80
-
SSDEEP
1536:OXyaslpQc4l/G1VfsjNCpv/pwnDi8FpUNkjHlH:OXyaslpf4HRCqFjlH
Score
8/10
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule sample office_macro_on_action -
resource sample
Files
-
dc7d5aaa-87b4-4a7d-a767-2b9cdda7b900.doc windows office2003
ThisDocument